HANA Database: System Privileges

You can find the following general system privileges which are available in the SAP HANA database system.

System PrivilegeDescription
ADAPTER ADMINControls the execution of the following adapter-related statements: CREATE ADAPTER / DROP ADAPTER and ALTER ADAPTER. It also allows access to the ADAPTERS and ADAPTER_LOCATIONS system views.
AGENT ADMINControls the execution of the following agent-related statements: CREATE AGENT / DROP AGENT and ALTER AGENT. It also allows access to the AGENTS and ADAPTER_LOCATIONS system views.
ATTACH DEBUGGERAuthorizes debugging across different user sessions. For example userA can grant ATTACH DEBUGGER to userB to allow userB to debug a procedure in userA’s session (userB still needs DEBUG privilege on the procedure however).
AUDIT ADMINControls the execution of the following auditing-related statements: CREATE AUDIT POLICY / DROP AUDIT POLICY and ALTER AUDIT POLICY as well as changes to the auditing configuration. It also allows access to the AUDIT_LOG / XSA_AUDIT_LOG and ALL_AUDIT_LOG system views.
AUDIT OPERATORAuthorizes the execution of the following statement: ALTER SYSTEM CLEAR AUDIT LOG. It also allows access to the AUDIT_LOG system view.
AUDIT READAuthorizes read-only access to the rows of the AUDIT_LOG / XSA_AUDIT_LOG and ALL_AUDIT_LOG system views.
BACKUP ADMINAuthorizes BACKUP and RECOVERY statements for defining and initiating backup and recovery procedures. It also authorizes changing system configuration options with respect to backup and recovery.
BACKUP OPERATORAuthorizes the BACKUP statement to initiate a backup.
CATALOG READAuthorizes unfiltered access to the data in the system views that a user has already been granted the SELECT privilege on. Normally the content of these views is filtered based on the privileges of the user. CATALOG READ does not allow a user to view system views on which they have not been granted the SELECT privilege.
CERTIFICATE ADMINAuthorizes the changing of certificates and certificate collections that are stored in the database.
CLIENT PARAMETER ADMINAuthorizes a user to override the value of the CLIENT parameter for a database connection or to overwrite the value of the $$client$$ parameter in an SQL query.
CREATE CLIENTSIDE ENCRYPTION KEYPAIRAuthorizes a user to create client-side encryption key pairs.
CREATE R SCRIPTAuthorizes the creation of a procedure by using the language R.
CREATE REMOTE SOURCEAuthorizes the creation of remote data sources by using the CREATE REMOTE SOURCE statement.
CREATE SCENARIOControls the creation of calculation scenarios and cubes (calculation database).
CREATE SCHEMAAuthorizes the creation of database schemas using the CREATE SCHEMA statement.
CREATE STRUCTURED PRIVILEGEAuthorizes the creation of structured (analytic privileges). Only the owner of the privilege can further grant or revoke that privilege to other users or roles.
CREDENTIAL ADMINAuthorizes the use of the statements CREATE CREDENTIAL / ALTER CREDENTIAL and DROP CREDENTIAL.
DATA ADMINAuthorizes reading all data in the system views. It also enables execution of Data Definition Language (DDL) statements in the SAP HANA database. A user with this privilege cannot select or change data in stored tables for which they do not have access privileges but they can drop tables or modify table definitions.
DATABASE ADMINAuthorizes all statements related to tenant databases such as CREATE / DROP / ALTER / RENAME / BACKUP and RECOVERY.
DATABASE START Authorizes a user to start any database in the system and to select from the M_DATABASES view.
DATABASE STOPAuthorizes a user to stop any database in the system and to select from the M_DATABASES view.
DROP CLIENTSIDE ENCRYPTION KEYPAIRAuthorizes a user to drop other users' client-side encryption key pairs.
ENCRYPTION ROOT KEY ADMINAuthorizes all statements related to management of root keys: Allows access to the system views pertaining to encryption (for example ENCRYPTION_ROOT_KEYS / M_ENCRYPTION_OVERVIEW / M_PERSISTENCE_ENCRYPTION_STATUS / M_PERSISTENCE_ENCRYPTION_KEYS and so on).
EXPORTAuthorizes EXPORT to a file on the SAP HANA server. The user must also have the SELECT privilege on the source tables to be exported.
EXTENDED STORAGE ADMINAuthorizes the management of SAP HANA dynamic tiering and the creation of extended storage.
IMPORTAuthorizes the import activity in the database using the IMPORT statements. The user must also have the INSERT privilege on the target tables to be imported.
INIFILE ADMINAuthorizes making changes to system settings.
LDAP ADMINAuthorizes the use of the CREATE | ALTER | DROP | VALIDATE LDAP PROVIDER statements.
LICENSE ADMINAuthorizes the use of the SET SYSTEM LICENSE statement to install a new license.
LOG ADMINAuthorizes the use of the ALTER SYSTEM LOGGING [ON | OFF] statements to enable or disable the log flush mechanism.
MONITOR ADMINAuthorizes the use of the ALTER SYSTEM statements for events.
OPTIMIZER ADMINAuthorizes the use of the ALTER SYSTEM statements concerning SQL PLAN CACHE and ALTER SYSTEM UPDATE STATISTICS statements which influence the behavior of the query optimizer.
RESOURCE ADMINAuthorizes statements concerning system resources (for example the ALTER SYSTEM RECLAIM DATAVOLUME and ALTER SYSTEM RESET MONITORING VIEW statements). It also authorizes many of the statements available in the Management Console.
ROLE ADMINAuthorizes the creation and deletion of roles by using the CREATE ROLE and DROP ROLE statements. It also authorizes the granting and revoking of roles by using the GRANT and REVOKE statements.
Activated repository roles meaning roles whose creator is the predefined user _SYS_REPO can neither be granted to other roles or users nor dropped directly. Not even users with the ROLE ADMIN privilege can do so. Check the documentation concerning activated objects.
SAVEPOINT ADMINAuthorizes the execution of a savepoint using the ALTER SYSTEM SAVEPOINT statement.
SCENARIO ADMINAuthorizes all calculation scenario-related activities (including creation).
SERVICE ADMINAuthorizes the ALTER SYSTEM [START|CANCEL|RECONFIGURE] statements for administering system services of the database.
SESSION ADMINAuthorizes the ALTER SYSTEM commands concerning sessions to stop or disconnect a user session or to change session variables.
SSL ADMINAuthorizes the use of the SET…PURPOSE SSL statement. It also allows access to the PSES system view.
STRUCTUREDPRIVILEGE ADMINAuthorizes the creation / reactivation and dropping of structured (analytic) privileges.
TENANT ADMINAuthorizes the tenant operations performed by the ALTER SYSTEM [RESUME|SUSPEND] TENANT statements.
TABLE ADMINAuthorizes LOAD / UNLOAD and MERGE of tables and table placement.
TRACE ADMINAuthorizes the use of the ALTER SYSTEM…TRACES statements for operations on database trace files and authorizes changing trace system settings.
TRUST ADMINAuthorizes the use of statements to update the trust store.
USER ADMINAuthorizes the creation and modification of users by using the CREATE | ALTER | DROP USER statements.
VERSION ADMINAuthorizes the use of the ALTER SYSTEM RECLAIM VERSION SPACE statement of the multi-version concurrency control (MVCC) feature.
WORKLOAD ADMINAuthorizes execution of the workload class and mapping statements (for example CREATE | ALTER | DROP WORKLOAD CLASS and CREATE | ALTER | DROP WORKLOAD MAPPING).
WORKLOAD ANALYZE ADMINUsed by the Analyze Workload / Capture Workload and Replay Workload applications when performing workload analysis.
WORKLOAD CAPTURE ADMINAuthorizes access to the monitoring view M_WORKLOAD_CAPTURES to see the current status of capturing and captured workloads as well of execution of actions with the WORKLOAD_CAPTURE procedure.
WORKLOAD REPLAY ADMINAuthorizes access to the monitoring views M_WORKLOAD_REPLAY_PREPROCESSES and M_WORKLOAD_REPLAYS to see current status of preprocessing / preprocessed / replaying and replayed workloads as well as the execution of actions with the WORKLOAD_REPLAY procedure.
identifier.identifierComponents of the SAP HANA database can create new system privileges. These privileges use the component-name as the first identifier of the system privilege and the component-privilege-name as the second identifier.

You May Also Like

Leave a Reply?